Try our new research platform with insights from 80,000+ expert users

Check Point Full Disk Encryption Software Blade vs Cisco Secure Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Full Disk Encry...
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
17
Ranking in other categories
Endpoint Encryption (7th), Mobile Data Protection (4th)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (12th), Endpoint Detection and Response (EDR) (13th), Cisco Security Portfolio (5th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Check Point Full Disk Encryption Software Blade is designed for Endpoint Encryption and holds a mindshare of 2.1%, up 1.4% compared to last year.
Cisco Secure Endpoint, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 1.5% mindshare, down 1.8% since last year.
Endpoint Encryption
Endpoint Protection Platform (EPP)
 

Featured Reviews

Danit Sannikov - PeerSpot reviewer
Can be well-integrated with the existing systems in a company and is very intuitive to use
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
Mark Broughton - PeerSpot reviewer
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It keeps the devices well monitored."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"It is a cross-platform tool."
"It helps us maximize the operational efficiency and performance of our activities."
"The initial setup is easy."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected."
"It used to take us a month to find out that something is infected, we now know that same day, as soon it is infected."
"There are several valuable features including strong prevention and exceptional reporting capabilities."
"The console feature gives a centralized management of what's going on, and if something happens, it gives you an alert. So, that's the most important feature for me."
"The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
"The solution is easy to deploy and applies multi-factor authentication."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source."
 

Cons

"They should improve the interface and make it a little more user-friendly."
"They could improve the latency in the platform when entering the portal."
"When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"The response time for technical support could be faster."
"In the future, I would like to see is the ability to decrypt equipment."
"In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."
"The product does not provide options like tunnel creation or virtual appliances."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"The solution needs more in-depth analytics."
"The user interface is dull."
"We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints."
"The reporting and analytics areas of the solution need to be improved."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
"Licensing fees are on a yearly basis and I am happy with the pricing."
"My company does make annual payments towards the licensing costs of the solution. Cisco Secure Endpoint is a little bit expensive."
"It is an expensive solution."
"There is also the Cisco annual subscription plus my management time in terms of what I do with the Cisco product. I spend a minimal amount of time on it though, just rolling out updates as they need them and monitoring the console a couple of times a day to ensure nothing is out of control. Cost-wise, we are quite happy with it."
"Because we do see the value of what it's bringing, I think they have priced it well."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
850,671 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
27%
Security Firm
10%
Financial Services Firm
8%
Government
8%
Computer Software Company
18%
Government
9%
Financial Services Firm
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point Full Disk Encryption Software Blade?
The cost of licenses depends on the characteristics or implementation you are looking for.
What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the usern...
What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
 

Also Known As

No data available
Cisco AMP for Endpoints
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Find out what your peers are saying about Microsoft, Sophos, ESET and others in Endpoint Encryption. Updated: May 2025.
850,671 professionals have used our research since 2012.